At a Glance
- Tasks: Join us to uncover advanced cyber threats and enhance detection capabilities.
- Company: Be part of a household name shaping the future of cyber security.
- Benefits: Enjoy hybrid work options and a competitive salary up to £60,000.
- Why this job: This is a unique chance to influence threat hunting in a legacy-free environment.
- Qualifications: Experience in threat hunting, incident response, and cloud platforms is essential.
- Other info: Work in the West Midlands with only 1-2 days on-site each month.
The predicted salary is between 43200 - 72000 £ per year.
We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a Threat Hunter to uncover advanced threats, identify attacker Tactics, Techniques, and Procedures (TTPs), and enhance their overall detection and response capability.
It's a unique chance to join early and shape how threat hunting is done in a large organisation with no Legacy systems in place!
We're looking for experience in:
- Threat hunting and incident response in complex environments
- Tracking and analysing TTPs using frameworks like MITRE ATT&CK
- Creating intelligence-led hunts and sharing actionable insights
- Cloud platforms (Azure, AWS, M365), Windows telemetry & endpoint visibility
- Strong reporting, stakeholder communication
Details:
- Location: West Midlands (Hybrid - 1-2x/month on-site)
- Salary: Up to £60,000
If you're interested in this exciting opportunity, please apply or send your CV to (see below).
Cyber Threat Hunter employer: La Fosse Associates Limited
Contact Detail:
La Fosse Associates Limited Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Hunter
✨Tip Number 1
Familiarise yourself with the MITRE ATT&CK framework, as it's crucial for tracking and analysing TTPs. Being able to discuss specific techniques and how you've applied them in past roles will demonstrate your expertise during interviews.
✨Tip Number 2
Stay updated on the latest trends in cyber threats and incident response. Follow relevant blogs, podcasts, and forums to gather insights that you can share during discussions with our team, showcasing your passion and knowledge in the field.
✨Tip Number 3
Prepare to discuss your experience with cloud platforms like Azure and AWS. Be ready to provide examples of how you've used these technologies in threat hunting or incident response scenarios, as this will be a key focus in the role.
✨Tip Number 4
Practice your reporting and stakeholder communication skills. Being able to convey complex technical information clearly and effectively is essential, so consider preparing a few examples of how you've successfully communicated findings in previous roles.
We think you need these skills to ace Cyber Threat Hunter
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in threat hunting and incident response. Use specific examples that demonstrate your ability to track and analyse TTPs, especially using frameworks like MITRE ATT&CK.
Craft a Compelling Cover Letter: In your cover letter, express your enthusiasm for the role and the opportunity to shape threat hunting in a large organisation. Mention your familiarity with cloud platforms like Azure and AWS, and how you can contribute to their detection and response capabilities.
Showcase Relevant Skills: Clearly outline your skills in reporting and stakeholder communication. Provide examples of how you've shared actionable insights in previous roles, as this will be crucial for the position.
Proofread Your Application: Before submitting, carefully proofread your application materials. Ensure there are no typos or grammatical errors, as attention to detail is vital in cybersecurity roles.
How to prepare for a job interview at La Fosse Associates Limited
✨Showcase Your Threat Hunting Experience
Be prepared to discuss your previous experience in threat hunting and incident response. Highlight specific examples where you successfully identified threats and the methodologies you used, especially in complex environments.
✨Familiarise Yourself with TTPs
Understand the Tactics, Techniques, and Procedures (TTPs) relevant to the role. Be ready to explain how you have tracked and analysed these using frameworks like MITRE ATT&CK, as this will demonstrate your expertise in the field.
✨Demonstrate Cloud Knowledge
Since the role involves working with cloud platforms like Azure, AWS, and M365, make sure you can discuss your experience with these technologies. Be prepared to talk about how you’ve utilised them for threat detection and response.
✨Prepare for Stakeholder Communication
Strong reporting and communication skills are essential. Think of examples where you effectively communicated findings or insights to stakeholders, and be ready to discuss how you tailor your communication style to different audiences.